The Dymin Web Defense Service is a fully-managed Web security solution that delivers effective protection against quickly-evolving Web threats like spyware, viruses and phishing attacks and incorporates technology to prevent unauthorized Internet activity. End users are protected from threats, while IT administrators gain peace of mind, visibility and control over Web usage, and spend less time repairing computers corrupted by malware.

Reduce IT costs Frees IT staff from threat management, enabling them to focus on core business needs. Fewer Spyware and virus infections mean less PC rebuilding, cleaning, and maintenance, better PC performance, and fewer Help Desk calls.

The Web Defense Service can protect your users, and your business, by blocking malicious code with the Dymin Web Defense Service – Threat Control package and preventing exposure to inappropriate Web content with the Dymin Web Defense Service – Content Control package. And finally, Dymin Web Defense Service – Total Control offers comprehensive protection against Web-based threats.

Dymin Web Defense Service – Threat Control: As your users surf the Web, Threat Control blocks known spyware, Trojans and viruses including those in Webmail messages before they reach your network or computers. Spyware that is already installed will be prevented from phoning home to deliver its payload of secretly-collected data. Phishing attacks are also blocked which to protect users from fraud and identity theft.

Dymin Web Defense Service – Content Control: Businesses can limit liability and promote a wholesome work environment by defining policies that limit where users can surf (e.g. no pornography, gambling). Productivity can be increased, and network bandwidth conserved, by minimizing or controlling access to online distractions such as personal webmail, gaming sites, or media downloads. Security is improved, since many unsavory websites are used to propagate malware, and blocking access to these sites reduces exposure to the threat. Our Safe Search feature prevents employees from downloading sexually explicit content from leading search engines and their caches (like images.google.com).

Dymin Web Defense Service Total Control: A bundle of both the Threat Control and Content Control packages.

The Dymin Web Defense Service adds several necessary layers of protection for email users who also access the Web:

Webmail users can become infected with viruses or spyware by downloading malicious attachments from their personal Webmail accounts. These emails and their attachments are not filtered by email securityservices such as the Dymin Email Defense Service, as they are downloaded via HTTP and not SMTP. TheThreat Control package provides virus scanning which detects malware retrieved via webmail attachments.

Content Control enables administrators to enforce policies which prevent users from accessing popular Webmail sites (like Yahoo!, Hotmail, or Gmail).

Threat Control protects users who are lured to fraudulent websites through Phishing emails. Users click on a Web links within Phishing emails when Threat Control blocks their Web client from accessing the fraudulent Phishing site. Similarly, users who click on fraudulent links within Instant Messages are also protected by Threat Control.

An increasing amount of malware is distributed via the web, and users can become infected just by visiting a malicious or hacked web site. The malware problem has grown beyond just email.

Prevents threats from entering the network: Filtering is performed at the network perimeter, the outermost layer in a multi-layered security strategy, which prevents malware from reaching an organization’s network or computers.

Stops threats before they reach the PC: Old security paradigms use a scan and remove approach to malware. Dymin prevents PCs from becoming infected and blocks malware downloads before they reach your systems.

Flexible, scalable protection: The Web Defense Service automatically grows as you grow. Our Operations team builds out our infrastructure so that you don’t have to add capacity as your user base or Web usage grows. If your organization adds new geographic locations, you don’t need to deploy additional servers for Web filtering.

No upfront costs. Our service does not require an up-front investment in hardware, software or setup fees. Some companies prefer to pay a monthly subscription service fee from their operating budgets and pay as they go rather than draw on their capital budgets.

Rapid activation. Procurement is simple and fast. Once you’ve purchased our solution, you don’t need to wait for hardware or software to ship. Nor do you need to install it. The setup and administration of our service is simple, and is performed via a Web console.

Simplifies the desktop. PCs can become crowded with point solutions (e.g. separate software for antivirus, anti-spyware and URL filtering). These point solutions become a maintenance issue and can introduce compatibility problems. Dymin does not rely on software installed on your users PCs.

More reliable and available. Our Web security service is hosted in our data centers and is managed by our Operations and Threat Center teams.

Your Web traffic is routed through our Web proxy servers, which filter the traffic according to policies you’ve determined in the Dymin Control Console. Threats are stopped safely at the network perimeter before they reach your computers or network.

First, Content Control and Phishing policies are applied, which prevent users from accessing inappropriate websites. If the user tries to visit an uncategorized site, our Dynamic Realtime Rating engine attempts to classify the site on the fly, which is essential, as many new inappropriate Websites come online each day.

Spyware payloads are blocked as spyware tries to phone home.

An access denied Web page is displayed when access to the undesirable Web page is blocked.

Finally, Web traffic is scanned for malicious code, including spyware, viruses and Trojans.

Most users will not experience slower Web browsing with the Web Defense Service. Since our proxy servers cache local copies of popular Web content, as popular Web accelerators do, some users will experience faster browsing performance than if they bypassed our filtering service. By keeping your PCs free of spyware and other malicious programs, the Web Defense Service helps PCs to run faster, which also improves Web browsing performance.

Content caching: Popular content is cached on our proxy servers, so it can be sent to the client more quickly than retrieving it from the target website, which is commonly done by popular Internet accelerators.

Yes, your administrator can define a list of trusted websites. If your organization subscribes to the Threat Control package, content from sites on the trusted sites list is still scanned for viruses and Trojans.

Unclassified websites are identified and automatically submitted for classification. Users can also nominate websites for prioritized classification by clicking the Feedback button on the Web Defense Service console. Uncategorized websites (usually new or visited infrequently) are scanned in real time by our Dynamic Realtime Rating Service, which does an exceptional job of identifying unsavory content.

No. While the Web Defense Service prevents Trojans, viruses and spyware from being downloaded via the Web, it does not remove malware from previously-infected computers. However, if your users have this preexisting condition, our service will prevent installed Spyware from phoning home via HTTP to deliver a payload of spied information to a collection site.

Should a user click on a link to a fraudulent website (usually via a phishing email or Instant Message), Threat Control blocks access to the site if it is known. Multiple sources of phishing site data help ensure that your users are protected by these evolving transient threats.

No. A key benefit of our Web Defense Service is that filtering is performed on our servers, not on your computers. No software. No hardware. No updates. No hassles. You can administer your filtering policies from anywhere, at any time, via our Web-based Dymin Control Console.

You direct your Web traffic to Dymin’s proxy servers. Configuration instructions will be provided in a Web Defense Service Welcome Kit, which will be emailed to you after registration. Typically, users can set up their HTTP proxy settings within a few minutes.

If your users are already routing their Web traffic through a web proxy server (e.g. Squid, Microsoft Proxy Server, Microsoft ISA Server, Symantec Web Security), the easiest way to route all of your users’ Web traffic through the Dymin Logic Web Defense Service is to chain your existing web proxy server to the Dymin service. Many multi-purpose firewalls have a built-in Web proxy server. (e.g. SonicWALL) which can be configured to automatically proxy Web traffic to the Dymin service. If your organization already uses a multi-purpose firewall which can redirect Web traffic, you can use it to route Web traffic to Dymin. (Note: Some Web proxy servers are incompatible with the user authentication method used by the Dymin Web Defense Service.) Businesses with a small number of users may want to configure each browser’s proxy settings manually. Alternatively, Microsoft’s Active Directory or a PAC file can be used to automatically update the browsers proxy settings.

In the unlikely event of a prolonged outage of the Web Defense Service, your IT staff or end users are able to restore (unprotected) access to the Internet by reconfiguring their browsers or internal Web proxy servers to route traffic directly. We suggest that you prepare a step-by-step instruction sheet that your IT group or end users can use to temporarily reroute Web traffic directly to the Internet, bypassing the Web Defense Service until the outage has been resolved.

Bypassing the Web Defense Service is a matter of undoing the configuration changes that route (or force) your Web traffic to our proxy servers. This may involve changes to individual Web browsers proxy settings, changes to internal Web proxy servers, and changes to your firewall, depending on how your organization configured access to the Web Defense Service